In this study, we introduce how these new tools improved the information security of users’ operating system and assisted enterprises or organizations to comply with ISMS and ISO standards; this study also used case studies to explain what improvement and advantages that these tools brought to users’ information security of these enterprises or organizations.